The EmailGPT service contains a prompt injection vulnerability. The service uses an API service that allows a malicious user to inject a direct prompt and take over the service logic. Attackers can exploit the issue by forcing the AI service to leak the standard hard-coded system prompts and/or execute unwanted prompts. When engaging with EmailGPT by submitting a malicious prompt that requests harmful information, the system will respond by providing the requested data. This vulnerability can be exploited by any individual with access to the service.
References
Link | Resource |
---|---|
https://www.synopsys.com/blogs/software-security/cyrc-advisory-prompt-injection-emailgpt.html | Third Party Advisory |
Configurations
History
18 Jun 2024, 17:06
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.1 |
References | () https://www.synopsys.com/blogs/software-security/cyrc-advisory-prompt-injection-emailgpt.html - Third Party Advisory | |
First Time |
Emailgpt
Emailgpt emailgpt |
|
CPE | cpe:2.3:a:emailgpt:emailgpt:-:*:*:*:*:*:*:* |
06 Jun 2024, 14:17
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
05 Jun 2024, 18:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-06-05 18:15
Updated : 2024-06-18 17:06
NVD link : CVE-2024-5184
Mitre link : CVE-2024-5184
CVE.ORG link : CVE-2024-5184
JSON object : View
Products Affected
emailgpt
- emailgpt
CWE
CWE-74
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')